SB2024020224 - SUSE update for slurm_20_11 



SB2024020224 - SUSE update for slurm_20_11

Published: February 2, 2024

Security Bulletin ID SB2024020224
Severity
High
Patch available
YES
Number of vulnerabilities 5
Exploitation vector Remote access
Highest impact Code execution

Breakdown by Severity

High 20% Medium 40% Low 40%
  • Low
  • Medium
  • High
  • Critical

Description

This security bulletin contains information about 5 secuirty vulnerabilities.


1) Race condition (CVE-ID: CVE-2023-41914)

The vulnerability allows a local user to escalate privileges on the system.

The vulnerability exists due to a race condition within the slurmd/slurmstepd processes. A local user can exploit the race and gain take ownership of an arbitrary file on the system.


2) Improper Enforcement of Message Integrity During Transmission in a Communication Channel (CVE-ID: CVE-2023-49933)

The vulnerability allows a remote attacker to perform MitM attack.

The vulnerability exists due to improper integrity check. A remote attacker can perform MitM attack and modify RPC traffic.


3) NULL pointer dereference (CVE-ID: CVE-2023-49936)

The vulnerability allows a remote attacker to perform a denial of service (DoS) attack.

The vulnerability exists due to a NULL pointer dereference error. A remote attacker can send specially crafted data to the application and perform a denial of service (DoS) attack.


4) Double Free (CVE-ID: CVE-2023-49937)

The vulnerability allows a remote attacker to execute arbitrary code on the target system.

The vulnerability exists due to a boundary error. A remote attacker can send specially crafted data to the application, trigger double free error and execute arbitrary code on the target system.

Successful exploitation of this vulnerability may result in complete compromise of vulnerable system.


5) Improper access control (CVE-ID: CVE-2023-49938)

The vulnerability allows a remote user to gain unauthorized access to otherwise restricted functionality.

The vulnerability exists due to improper access restrictions. A remote user can modify extended group list that is used with the sbcast subsystem, and open files with an unauthorized set of extended groups


Remediation

Install update from vendor's website.